N750 Wireless Dual Band Gigabit ADSL Modem Router DGND4000
-Direction/Type. This setting is used when determining if the IKE policy matches the current traffic. Select the desired option.
-Responder only. Incoming connections are allowed, but outgoing connections are blocked.
-Initiator and Responder. Both incoming and outgoing connections are allowed.
-Exchange Mode. Currently, only Main Mode is supported. Ensure that the remote VPN endpoint is set to use Main Mode.
-
-Local Identity Type. Select the desired option to match the Remote Identity Type setting on the remote VPN endpoint.
-WAN IP Address. Your Internet IP address.
-Fully Qualified Domain Name. Your domain name.
-Fully Qualified User Name. Your name, email address, or other ID.
-Local Identity Data. Enter the data for the selection. If WAN IP Address is selected, no input is required.
-Remote Identity Type. Select the desired option to match the Local Identity Type setting on the remote VPN endpoint.
-IP Address. The Internet IP address of the remote VPN endpoint.
-Fully Qualified Domain Name. The domain name of the remote VPN endpoint.
-Fully Qualified User Name. The name, email address, or other ID of the remote VPN endpoint.
-Remote Identity Data. Enter the data for the selection. If IP Address is selected, no input is required.
•Parameters.
-Encryption Algorithm. The encryption algorithm used for both IKE and IPSec. This setting must match the setting used on the remote VPN gateway.
-Authentication Algorithm. The authentication algorithm used for both IKE and IPSec. This setting must match the setting used on the remote VPN gateway.
-
-SA Life Time. This setting determines the time interval before the SA (security association) expires. (It is automatically reestablished as required.) While using a short time period (or data amount) increases security, it also degrades performance. It is common to use periods over an hour (3600 seconds) for the SA lifetime. This setting applies to both IKE and IPSec SAs.
-Enable PFS (Perfect Forward Secrecy). If enabled, security is enhanced by ensuring that the key is changed at regular intervals. Also, even if one key is broken, subsequent keys are no easier to break. (Each key has no relationship to the previous key.)
Advanced Settings
131